Tunnelblick

A few month ago I started to look at OpenVPN which has a very good GUI for the Mac called “Tunnelblick“. After I managed to set it up on my server I thought why not share my home directory via the VPN tunnel and mount it on my Desktop. It should be fairly usable, providet I’ve got sufficient net connection on my end, since my server has a 100MBit internet line. So I set up Samba and let it listen only on the VPN interface.
The following is a quick step-by-step how-to on setting up such a setup 🙂

Install OpenVPN on your server
Donwload the latest source from http://openvpn.net/download.html
Unpack it and run the usual commands:
./configure
make
make install

Then do some testing:
make check
If it all works fine, you’re good to go.
The other possibility is of course to install it from a package your distribution provides you, in my case this is handled by apt (aptitude install openvpn) which has the advantage of setting up init scripts so the VPN is startet at system boot and taking care that the whole environment on the server is suitable.

Configure OpenVPN on your server
We’re gonna work with a pre shared static key here because it is easier to set up and provides enough security for home use.
My config file on the server side looks as simple as following (/etc/openvpn/home.conf):
dev tun
ifconfig 10.8.0.1 10.8.0.2
secret static.key
comp-lzo
keepalive 10 60
ping-timer-rem
persist-tun
persist-key

This tells OpenVPN to start a new VPN on the “tun” device with the IP of 10.8.0.1 using the key named “static.key”. The rest are some tweaking commands which should be pretty self explanatory.

Now we only need the static key.
We can construct one by putting in the following command:
openvpn --genkey --secret static.key
The static key file is formated in ASCII and should be kept very private. Send one copy to the computer you would like to connect to your server and keep the other copy besides your config file on your server.

Install and set-up Samba
Next you need to install Samba. I again took the Debian way via “aptitude install samba”. Then I tweaked the standard setup to export the user’s home directories and listen only on the VPN interface and not the normal one.
interfaces = lo, 10.0.0.0/8
bind interfaces only = Yes

[homes]
comment = Home Directories
browseable = yes
writable = yes
create mask = 0775
directory mask = 0775

The rest of the smb.conf file can be pretty much left alone.

Start openvpn and samba
Provided you installed it via your packaging system or set up the init scripts yourself you can now start the two programs by typing in “/etc/init.d/openvpn start” and “/etc/init.d/samba start” (or wherever your distri keeps it’s init scripts).
If the two started up ok, you’re done on the server side.
Time to move on to the client.

Install Tunnelblick
Download it from www.tunnelblick.net, mount the Disk Image and double click on “Tunnelblick-Complete.mpkg” which installs all the necessary drivers and software packages. Now you should have a Tunnelblick icon in your Applications folder.
When starting the program for the first time, it will well you that there is no configuration file present and will offer you a sample configuration.
Simply replace the sample configuration with the following:
remote IP_OR_DOMAIN_OF_YOUR_SERVER
dev tun
ifconfig 10.8.0.2 10.8.0.1
secret static.key
comp-lzo
keepalive 10 60
ping-timer-rem
persist-tun
persist-key

As the last step you have to put the file “static.key” that you obtained from your server earlier in ~/Library/openvpn (this is where your config resides as well).
This should be it. Click on the Tunnel entrance symbol to the left of your Spotlight icon and choose your config, after a short moment the connection will be present.

The last thing to do is to mount your home directory.
Press CMD+K in the Finder (or go to “Go -> Connect to Server” in the Menu) and type in the following:
smb://user@10.8.0.1/user
substituting “user” with your username on the server. After that a new icon should appear on your desktop containing all the files you have in your home directory on your server 🙂

No it wasn’t my fault but the stupid DNS provider’s.
They had a partial outage of their service for the whole weekend (even their own website wasn’t reachable) and didn’t answer ANY of our calls or email enquiries.

As a result all of the ~20 domains that I run on this server will be migrated to our own DNS servers.
HowtoForge has a good tutorial on MyDNS which we will try and most probably use.

Sorry again for the outage and I hope with taking the matter in our own hands, such things won’t happen again in the future.

MotionI recently installed a simple video surveillance system at a facility I work.

The main goal is to know who (and when) entered our server room. Currently the setup features a tiny Philips USB cam connected to a Linux server (running Debian Sarge). At a later Stage this webcam will be replaced by a proper network camera (or even several cameras).

The software I used is called Motion – a relatively easy to set up video surveillance system that does motion detection (…and much, much more). Motion detection is ideal for my purpose because the room is normally completely dark unless somebody enters it and switches on the light.

Now every time somebody comes in, a short video is produced and saved on our server. I made a web accessible filesystem alias to the video directory, so I could check whether there was new footage available. This process was not automated enough for me, so I slapped together a short (und ugly) PHP script that takes the contents of the video directory and delivers it as a RSS feed that I can now subscribe to with my news reader.

The script is available at the Motion WIKI and can also be downloaded from there.

[Update:]
Some photos of the former chaos in our server room and it’s extinction can be viewed here.

special thanks to Herbert for having the idea 😉

KisMACAfter nearly a year, and a bunch of new developers, the Mac OS X passive wireless stumbler KisMac has produced another stable release. It now includes passive mode stumbling on AirPort Extreme hardware, is a Universal binary for the benefit of people with Intel Macs, does Google Earth exporting, has many bugs fixed and much much more…

On my iBook passive monitoring mode works out of the box – perfect 🙂

I discovered that in addition to the open, unprotected network named “Netgear” in my neighborhood, there is also an unprotected WLAN which hides it’s SSID. Whatever the advantage of hiding SSID but not encrypting a WLAN is…

WordpressGrowlWow! I really gotta have this.
The Binary Bonsay has set out a competition to code a Growl plugin that notifies you of events happening at your WordPress install. This is a great idea. I hope the guys working on it can sort out the NAT issues somehow and will deliver a working implementation.

If you wonder what Growl is:

As described on the Growl website, Growl is a global notification system for Mac OS X. Any application can send a notification to Growl, which will display an attractive message on your screen. Growl currently works with a growing number of applications.